Novell Groupwise Client ActiveX Control Buffer Overflow Vulnerability

Summary
This host is installed with Novell Groupwise Client ActiveX Control and is prone to Buffer Overflow vulnerability.
Impact
Successful expoitation will allow remote attackers to execute arbitrary code on the affected system and may crash the client.
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one. A Workaround is to set the Killbit for the vulnerable CLSID http://support.microsoft.com/kb/240797
Insight
A boundary error occurs in Novell Groupwise Client ActiveX control(gxmim1.dll) while handling overly long arguments passed to the 'SetFontFace()' method.
Affected
Novell GroupWise Client 7.0.3.1294 and prior on Windows.
References